colemic wrote: » why did you assume that he brought the disk from home/used it on his personal computer?
JDMurray wrote: » I'm sure the people sitting around a big table group-writing that exam item probably talked themselves into accepting it using the this same logic.
colemic wrote: » When I do an audit, having weak passwords is a high-risk finding. (very few, if any, exceptions.) Not changing the default administrator account name is always considered a low-risk finding. I am sure that influenced my (wrong) answer.
colemic wrote: » Another winner: An IS auditor observed brute-force attacks on the administrator account. The BEST recommendation to prevent a successful brute-force attack would be to: A.increase the password length for the user. B.configure a session timeout mechanism. C.perform periodic vulnerability scans. D.configure a hard-to-guess username. I answered A, and the correct answer is D. Explanation: Knowledge of both a username and password is required to successfully compromise an account using brute-force attack. If a username is guessable, brute-force attacks are much more feasible. Increasing the password length is not as good as having a username that cannot be discovered. Session timeouts do not prevent unauthorized access. Vulnerability scans typically test for default usernames and passwords, but do not prevent brute-force attacks. Performing periodic vulnerability scans is a good detective control, but does not prevent brute-force attacks. Hm. I was under the impression that it was always much, much easier to obtain user names than passwords.
colemic wrote: » Case in point: While copying files from a floppy disk, a user introduced a virus into the network. Which of the following would MOST effectively detect the existence of the virus? A. A scan of all floppy disks before use B.A virus monitor on the network file server C.Scheduled daily scans of all network drives D.A virus monitor on the user's personal computer I answered A. which was incorrect. The correct answer is D. The explanation given: Scheduled daily scans of all network drives will detect the presence of a virus after the infection has occurred. All of the other choices are controls designed to prevent a computer virus from infecting the system.The term “monitor” means, by definition, that the antivirus programs are actively looking for viruses. Most current antivirus systems perform real-time monitoring when a file is imported from a “floppy” disk into a computer system. The most effective way to DETECT a virus would be through real-time antivirus monitoring at the user's desktop. This would detect the virus before it was transferred to the system/network. Most antivirus systems will prompt the user as to whether the user wants to continue the transfer or to eradicate the virus. So the MONITORING functions are separate from the PREVENTIVE controls implied in the answers. Further, if the information was transferred from the floppy disk to a local PC, as is the case in most circumstances, a scheduled daily scan of “network” drives won't detect the virus because personal drives (choice C) are not backed up to a network drive. Do I need to even comment on how wrong this is? (If you think they are correct, please explain it to me. I fail to see how a user's personal computer comes into this at all, as the question certainly did not indicate that the disk was brought from home.) It is driving me crazy!!!
cabrillo24 wrote: » Virus scanning software quarantines and cleans viruses (which is a corrective control), whereas the question is asking what method is best for "DETECTING".
colemic wrote: » OK, I'll accept your logic on the first one. But the second -doesn't virus scanning software have to detect before it quarantines and cleans viruses, thus making it a detective control as well as a corrective control? I get what you are saying about taking the question literally - but in this case, to answer the question correctly, you have to assume that the user brought the disk from home, which, when I originally read the question, did not assume to be true, since it was not explicitly stated. I just don't see the value in these kinds of questions. I have NEVER EVER EVER been as frustrated studying for a test as this, and I thought the CISSP had the market cornered on the 'choose the BEST answer' category. ISACA blows them out of the water in that regard. The cert won't hold much personal value for me if all I feel I conquered was semantics, instead of proving relevant knowledge. Thank God it will be over in a week regardless.